A Secure Interaction and Control Method for Inter-Clouds Services

被引:0
|
作者
Gan Jiefu [1 ]
Peng Li [3 ]
Lu Yueming [2 ]
机构
[1] China Informat Secur Certificat Ctr, Beijing 100020, Peoples R China
[2] Minist Educ, Key Lab Trustworthy Distributed Comp & Serv BUPT, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
关键词
inter-clouds services; encryption; signature; spoofing;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Inter-clouds services build information bridges over computing clouds so as to provide the convenience for electronic commerce and other information services. However, the interactions between clouds have challenges in information disclosure, services spoofing and information inconsistent. This paper proposes a secure interaction and control method for inter-clouds services, which uses information encryption, digital signature, time logic control means, to protect users' privacy and keep the integrity and consistency of cloud customers' request information, and prevent the spoofing of information requests. The results show that the method could prevent the spoofing well in a stable network environment and improve the security of clouds sessions.
引用
收藏
页码:132 / 137
页数:6
相关论文
共 50 条
  • [1] A Secure Interaction and Control Method for InterClouds Services
    GAN Jiefu
    PENG Li
    LU Yueming
    [J]. China Communications, 2015, (S2) : 132 - 137
  • [2] A Secure Interaction and Control Method for InterClouds Services
    GAN Jiefu
    PENG Li
    LU Yueming
    [J]. 中国通信., 2015, 12(S2) (S2) - 137
  • [3] Virtual Machines' Load-Balancing in Inter-Clouds
    Riduan Abid, Mohamed
    Kaddouri, Karima
    Smith, Kevin
    Idriss El Ouadghiri, Moulay
    Gerndt, Michael
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 109 - 116
  • [4] Automating Resource Selection and Configuration in Inter-Clouds through a Software Product Line Method
    Leite, Alessandro Ferreira
    Alves, Vander
    Rodrigues, Genaina Nunes
    Tadonki, Claude
    Eisenbeis, Christine
    Magalhaes Alves de Melo, Alba Cristina
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 726 - 733
  • [5] Establishing Trust in Cloud Computing Security with the Help of Inter-Clouds
    Tripathi, Mukesh Kant
    Sehga, Vivek Kumar
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1749 - 1752
  • [6] Cloud Computing and Inter-Clouds - Types, Topologies and Research Issues
    Rani, B. Kezia
    Rani, B. Padmaja
    Babu, A. Vinaya
    [J]. BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 24 - 29
  • [7] Reputation guided Genetic Scheduling Algorithm for Independent Tasks in Inter-Clouds Environments
    Pop, Florin
    Cristea, Valentin
    Bessis, Nik
    Sotiriadis, Stelios
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 772 - 776
  • [8] Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments
    Pop, Florin
    Dobre, Ciprian
    Cristea, Valentin
    Bessis, Nik
    Xhafa, Fatos
    Barolli, Leonard
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2015, 11 (01) : 4 - 20
  • [9] Private Clouds: Secure Managed Services
    Orakwue, Enuma
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (06): : 295 - 298
  • [10] AN ITERATIVE METHOD FOR SECURE INTER-PROCEDURAL INFORMATION-FLOW CONTROL
    MIZUNO, M
    [J]. PROCEEDINGS : THE THIRTEENTH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 1989, : 286 - 291